CN102449667B - For entering the method and apparatus of monitoring - Google Patents
For entering the method and apparatus of monitoring Download PDFInfo
- Publication number
- CN102449667B CN102449667B CN201080024088.0A CN201080024088A CN102449667B CN 102449667 B CN102449667 B CN 102449667B CN 201080024088 A CN201080024088 A CN 201080024088A CN 102449667 B CN102449667 B CN 102449667B
- Authority
- CN
- China
- Prior art keywords
- code
- visitor
- enter
- entering
- mobile phone
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 39
- 238000012544 monitoring process Methods 0.000 title claims abstract description 22
- 230000005540 biological transmission Effects 0.000 claims abstract description 9
- 239000011159 matrix material Substances 0.000 claims description 14
- 230000003287 optical effect Effects 0.000 claims description 11
- 238000004891 communication Methods 0.000 claims description 6
- 238000010276 construction Methods 0.000 claims description 4
- 230000008569 process Effects 0.000 description 5
- 238000010586 diagram Methods 0.000 description 3
- 230000002349 favourable effect Effects 0.000 description 3
- 201000009032 substance abuse Diseases 0.000 description 3
- 238000004590 computer program Methods 0.000 description 2
- 238000012937 correction Methods 0.000 description 2
- 235000006508 Nelumbo nucifera Nutrition 0.000 description 1
- 240000002853 Nelumbo nucifera Species 0.000 description 1
- 235000006510 Nelumbo pentapetala Nutrition 0.000 description 1
- 229910002056 binary alloy Inorganic materials 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000013506 data mapping Methods 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000008676 import Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000009776 industrial production Methods 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 238000004321 preservation Methods 0.000 description 1
- 230000004044 response Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C2209/00—Indexing scheme relating to groups G07C9/00 - G07C9/38
- G07C2209/60—Indexing scheme relating to groups G07C9/00174 - G07C9/00944
- G07C2209/62—Comprising means for indicating the status of the lock
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/29—Individual registration on entry or exit involving the use of a pass the pass containing active electronic elements, e.g. smartcards
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/69—Identity-dependent
- H04W12/77—Graphical identity
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Telephonic Communication Services (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
Abstract
The present invention relates to a kind of method for entering monitoring, comprising the following steps.Identification code (ID) is sent to entering node (2) by mobile phone (1).If identification code (ID) is identified as effectively, then enter code (6 from entering node (2) to mobile phone (1) transmission; 7) and be presented on the display screen (1.1) of mobile phone (1).Obtained by camera (5) and enter code (6; 7), and if enter code (6; 7) be identified as effectively, then allowing to enter.
Description
Technical field
The present invention relates to a kind of method and apparatus for entering monitoring.
Background technology
WO2006/000618A2 discloses a kind of for the method for wireless input for the destination call of elevator.At this, required by mobile phone to set up wireless connections between the mobile phone of the personnel of lift car and elevator control gear in a first step.In the second step, the floor at elevator control gear identification personnel and personnel and select to belong to the files on each of customers of these personnel.Subsequently, elevator control gear by means of this files on each of customers determination destination floor and be responsible for providing the lift car of the floor gone at these personnel for these personnel and this destination floor backward travel.
Document JP2005-280882 discloses a kind of elevator with security system, adopts mobile phone identification personnel in this elevator.Obtain to make these personnel and enter the license of elevator, the identification code utilizing optical read device to obtain to be presented on the display screen of mobile phone and be delivered to recognition unit.If this identification code and personnel put on record on recognition unit, then these personnel obtain the license entering elevator.
Summary of the invention
The object of the invention is to, proposing the method and apparatus entering monitoring for entering buildings, construction zone, room, lift car or elevator.Here should guarantee that the personnel only really with access entitlements obtain access admittance.The manipulation for the purpose of abusing should be avoided as far as possible.
This object is by having realizing for the method entering monitoring of the feature of claim 1.
Comprise the following steps according to the method for entering monitoring of the present invention.Identification code is sent to entering node by mobile phone.If identification code is identified as effectively, then enters code from entering node to mobile phone transmission and be presented at the display screen of mobile phone.Obtained by camera and enter code, and if this enter code and be identified as effectively, then allow to enter.
Favourable improvement of the present invention limits in the feature of dependent claims.
According in an embodiment of method of the present invention, identification code is the telephone number of mobile phone.
According in another embodiment of method of the present invention, entering code is two-dimension optical code.
According in the 3rd embodiment of method of the present invention, entering code is data matrix code or QR code.
In addition, in the method according to the invention, identification code is delivered to control module from entering node, and subsequently, control module checks whether this identification code is included in the list of the identification code with permission.If this is the case, code is entered to entering node transmission.
In addition favourable also have, if this for enter monitoring method in allow to enter, then provide an elevator for.
In improving according to one of method of the present invention, enter code and limit effective within a certain period of time.Therefore, the risk of abuse is further reduced.
In improving according to of the present invention another, enter code and only can be only used once.Therefore, the risk of abuse is further reduced.
What can be used to buildings, construction zone, lift car or elevator according to method of the present invention enters monitoring.
Comprising mobile phone according to equipment of the present invention and entering node for the method implementing to enter monitoring, enter node and designed as follows and can work as follows: it can receive the identification code of mobile phone and can enter code to mobile phone transmission.This equipment also comprises control module, and this control module is designed as follows and can work as follows: it can detect identification code and can enter code.Arrange optical pickup in addition, it is connected with control module.
In a device in accordance with the invention, optical pickup is scanner or camera.
Finally also propose a kind of computer program, it is stored on the media that can be used by computing machine, containing the procedure code that can be read by computing machine, and is responsible for making the computer-implemented above-mentioned method for entering monitoring.This computing machine can be control module or the parts entering node.
Accompanying drawing explanation
The present invention is elaborated with reference to accompanying drawing below by means of four embodiments.
Fig. 1 shows in block form an according to one of the equipment for entering monitoring of the present invention possible embodiment.
Fig. 2 shows an example for data matrix code.
Fig. 3 shows an example for QR code.
Fig. 4 shows the process flow diagram of setting forth according to the method for entering monitoring of the present invention.
Fig. 5 shows another example according to the method for entering monitoring of the present invention.
Embodiment
Embodiments of the present invention are set forth below by means of Fig. 1 to 4.Show in block form an in FIG according to one of the equipment for entering monitoring (Zugangskontrolle) of the present invention possible embodiment.Fig. 4 shows the process flow diagram for setting forth an embodiment according to the method for entering monitoring of the present invention.
Obtain the license entering buildings, construction zone (as room or elevator 9) to make personnel, these personnel can be identified entering node 2 place accordingly by its mobile phone 1, enter node 2 and are also called access point AP below.Enter in the coverage of node 2 once these personnel and mobile phone 1 thereof arrive, then by dedicated radio link 8 identification code ID is sent to from mobile phone 1 and enters node 2 (step S1).
Dedicated radio link 8 can realize as by bluetooth.Bluetooth is a kind of standard according to IEEE802.15.1 and is used through shorter distance instrument wireless connections are become network.In addition, bluetooth yet forms both interface, mobile phone 1 with enter node 2 can by the mutual communication of this interface.
Enter node 2 and be equipped with corresponding antenna 2.1 for this reason.After entering node 2 and receiving identification code ID, its by identification code relay transmission to control module 3 (step S2).Control module 3 can be such as server.Enter node 2 and control module 3 is spatially provided separately usually.But this is not obsessive.Can also arrange between floors and multiplely enter node 2, it is all connected with control module 3.
Identification code ID is the telephone number of mobile phone 1 in an advantageous manner.But also can be arranged to, use the personnel of mobile phone 1 must input certain code, such as password by the keyboard 1.2 of mobile phone 1, this code is delivered to by dedicated radio link 8 subsequently and enters node 2.In the case, the code inputted by keyboard 1.2 is consistent with identification code ID.
In another step S3, server 3 detects and receives identification code ID.If this identification code ID is considered to (the step S4) that be not allowed to, then server 3 notice enters these personnel of node 2 and is denied access to a certain equipment, such as elevator 9 (step S5).If identification code ID is construed to be allow (step S4) in contrast, then server 3 enters code (step S6) and is delivered to and enters node 2.Enter code and be also referred to as optical code below.
Entering code may be limited in certain hour effective.Therefore the personnel that achieve only allow to enter in interval sometime.Can be arranged in addition, identification code is only once effective, thus makes it can not be used after being only used once again.Therefore abuse is prevented.Like this, mobile phone 1 can not be realized entering with the same code that enters by other librarian use.
Can be arranged in addition: once the personnel of carrying mobile phone 1 are allowed to enter, then continue to enter with same mobile phone 1 for certain time interval and/or for certain node locking that enters.Thus prevent mobile phone 1 given another personnel realize with this mobile phone realize enter.
Can by server 3 occur such as data matrix code 6 as entering code.Fig. 2 shows the example for this type of data matrix code 6.The concept of code does not represent the encryption of the data securely obtaining data in this association, but represents figure reflection (grafischeAbbildung) of the data of binary-coded character.Data matrix code is two-dimensional bar or 2D code, and it exists with different patterns, such as " ECCn ".ECC represents error detection and correction algorithm and n below represents value between 0 to 200.The pattern that can the most reliably read is ECC200 pattern.The size of the code image of square or rectangle is determined from larger selection quantity, and the character element of code image is square or circular.Data matrix code International Standards Organization (ISO) to put on record as standard and ISO specification ISO/IEC16022:2000 and ISO/IEC24720:2006 and other application standard, as DIN standard or DIN-EN standard in put on record.These standards are enforceable in the industrial production.Ensure that by adopting standardized code the manufacturer that code can have nothing to do in scrambler or reader is read.
For data matrix code 6, information square or rectangle plane in the form coding of the pattern of the point of formed objects.These points are etuis of black or white, and it is interconnected or has round dot betwixt, and these round dots have space.Unified character boundary and fixing character pitch make the reading of image and the decoding of information become safety and make data matrix code extension in the plane compact.When reading data matrix code, obtain in the frame being arranged in inside, edge and matrix of point.
Data matrix code 6 comprises the data of redundancy, thus makes the mistake that such as can correct maximum 25% with Reed-Solomon error correction when ECC200 in code pattern.This is covered or be very favorable when not can read in code pattern part.
Alternatively, such as also can there is QR code 7 as entering code by server 3 for this reason.Fig. 3 shows an example for this type of QR code 7.QR code 7 is bar code or the 2D code of two dimension equally, and wherein, QR represents rapid answer (QuickResponse).
In QR code 7, the encryption of the concept of code also not representative data, but the data mapping in binary-coded character.The square matrices that QR code 7 is made up of the point of black and white is formed, and these points represent the data of the coding in binary system.Special marking in foursquare three or four angles has preset orientation.In QR code, there are data redundantly, even make the QR code of maximum 30% damaged, it also can correctly be read.Utilize QR code 7 can store maximum 7089 digits, 4296 letter characters or 2953Byte.Standard for QR code can find in iso standard ISO/IEC18004.
Data matrix code 6 and QR code 7 all can utilize optical pickup 5, such as scanner or camera machine to read.The data be included in code 6 and 7 can continue process subsequently electronically.
After server 3 enters code 6 or 7 and is delivered to and enters node 2, to send to mobile phone 1 by dedicated radio link 8 enter code 6 or 7 from entering node 2 in step 7.
Then, on the display screen 1.1 of mobile phone 1, display enters code 6 or 7 in step s 8.This can be entered code and be shown to camera 5 by the user of mobile phone 1, and the image entering code that has of picked-up is sent to server 3 (step S10) by it.Whether server 3 inspection enters code is allow (step S11).This can such as realize as follows: the code that enters that code and server be sent to mobile phone 1 that enters absorbed by camera 5 compares by server 3.If enter code to be considered (the step S11) that be allowed to, server 3 notice enters node 2, and these personnel are allowed to enter (step S12).If enter code to be considered in contrast (the step S11) that be not allowed to, then notified to enter node 2 by server 3, these personnel are denied access to or use a certain equipment, such as elevator 9 (step S13).If refusal enters elevator 9, then control module 3 notifies the elevator control gear 4 for controlling elevator 9.Elevator control gear 4 imports corresponding measure subsequently.
The concept entering (Zugang) is understood to general concept in current context relation, and it not only comprises and allows to enter buildings, room or lift car, also comprises and allows to use instrument or equipment, such as elevator.
Fig. 5 shows according to Fig. 1 to 4 for entering the process flow diagram of another example according to method of the present invention of monitoring.
Buildings always enters monitoring by electronics and ensures safety.The resident family of buildings or the staff gone to work in this buildings also can receive the visitor of the access entitlements without this buildings.In order to enable these visitors be allowed to enter in simple and efficient mode, can use according to Fig. 1 to 4 adopt according to the method for entering monitoring of the present invention.
In step 1, the resident family of buildings or the staff that goes to work between floors propose to the request of equipment by means of communication unit 10 (such as computing machine, PDA, mobile phone etc.) to control module 3 for the visitor without access entitlements or set up the request of files on each of customers for this visitor.
This request can comprise at least one rule, such as sets up by means of web application, suitable computer program, meeting agreement or management application program etc. and is sent to control module 3.Meet with agreement or manage application program and represent the Notes of such as Lotus Development, Outlook of Microsoft etc.
Control module 3 is set up files on each of customers according at least one rule in the second step and for this files on each of customers, identification code is sent to the mobile phone 1 of visitor.
This at least one rule can be arbitrary.It is determined by communication unit 10 and/or by control module 3.It is contemplated that this at least one rule is, do not adopt rule.It can also depend on demand for security, user's request (such as disabled person enter etc.), visitor's demand etc.Such as can define a time window as at least one rule, allow to enter in this time window, thus make to enter only effective provisionally.At least one rule can also be detected before whether visitor be positioned at buildings before allowing to enter.Another rule can be, visitor's edge to access when entering buildings stops path monitored or tracking by means of suitable supervisory system in place.If this visitor obtains the possibility more than once entering, then can determine entry time point by means of at least one rule.Such as can specify, this visitor should only enter to 17 o'clock 14 o'clock Fridays respectively.
As described in Fig. 1 to 4, identification code can be sent to mobile phone 1 with method from control module 3 in a different manner.It can such as in note, in the e-mail, obtain in radio station or speech message etc. and be such as made up of password, sound, tune, language, alphabetic string, link etc.
Files on each of customers can comprise the data that at least one allows the certification of visitor.But it is also conceivable to the examination possibility that files on each of customers only comprises this few rule and identification code.
The identification code being used for requirement and entering code is sent to control module 3 by mobile phone 1 in third step.Optionally, according to step 3 ' identification code can be sent to control module 3 from mobile phone 1 by entering node 2.This interchangeable mode describes in Fig. 1 to Fig. 4.In this case advantageously, can determine whether visitor stays in the entrance area of buildings simultaneously.
Control module 3 detects according to step 4 identification code that obtains from mobile phone 1 and the verify data of this yard with files on each of customers and the examination possibility wherein comprised and/or visitor is compared.The original identification code, telephone number, name, random value etc. that send to mobile phone 1 such as can be adopted as examination possibility or certification possibility.Suitable algorithm such as can be utilized from identification code that is original and that send before, to calculate cryptographic hash (Hash-Werte) and compared by control module 3.If the identification code sent and files on each of customers or with preservation or the comparing of data be stored in files on each of customers draw effective value before, then occurred by control module 3 and send to mobile phone 1 to enter code, such as numeric string, Quick Response Code, QR code, data matrix code, bar code, image etc.
Alternatively, according to step 4 ' can also realize entering code transmission from control module 3 to mobile phone 1 through entering node 2.
The code that enters that the output device (such as display) of mobile phone illustrates to be obtained by optical pick-up unit 5 according to the 5th step and enters node 2 according to step 6 ' process or be directly sent to control module 3 according to step 6.
Whether effectively or be allowed to control module 3 detects to enter code according to step 7 according at least one rule in files on each of customers and/or according to files on each of customers.If it is effective to enter code, by control module 3 access admittance is sent to and enters node 2 and allow visitor to enter buildings thus.
If files on each of customers comprises the rule that at least one should notify interviewee, then send message, such as note, Email, voice messaging etc. from control module 3 to communication unit 10 according to step 8, thus make interviewee know the arrival of visitor.
What describe is only used as schematic description according to embodiments of the invention and is not used in restriction the present invention before.Different changes and change can also be realized in category of the present invention, and scope of the present invention and its equivalent scope can not be exceeded.Such as replace camera and can also use scanner, in order to detect the display screen 1.1 of mobile phone 1 enters code 6 or 7.
Claims (11)
1., for entering a method for monitoring, comprise the following steps:
Enter node (2) and receive identification code (ID) from the mobile phone (1) of visitor, wherein, files on each of customers is set up for the visitor without access entitlements, described files on each of customers contains the rule that at least one should notify interviewee, the message of the interviewee arriving described visitor about visitor is sent from control module (3) to communication unit, thus make interviewee know the arrival of visitor
After identification code (ID) is identified as effectively, enter code (6 from entering mobile phone (1) transmission of node (2) to visitor; 7),
Obtained by optical pickup (5) and enter code (6; 7) code (6 is entered; 7) be presented on the display screen (1.1) of the mobile phone (1) of visitor,
Entering code (6; 7), after being identified as effectively, allow to enter.
2. the method for claim 1, wherein identification code (ID) is the telephone number of the mobile phone (1) of visitor.
3. method as claimed in claim 1 or 2, wherein, enters code (6; 7) be two-dimension optical code.
4. method as claimed in claim 1 or 2, wherein, enters code (6; 7) be data matrix code (6) or QR code (7).
5. method as claimed in claim 1 or 2, wherein,
Identification code (ID) is delivered to control module (3) from entering node (2),
Control module (3) checks whether identification code (ID) is included in the list of the identification code with license, if identification code (ID) is included in described list, enters code (6 to entering node (2) transmission; 7).
6. method as claimed in claim 1 or 2, wherein, if allow to enter, then provide an elevator (9) for.
7. method as claimed in claim 1 or 2, wherein, enters code (6; 7) restriction is effective within a certain period of time.
8. method as claimed in claim 1 or 2, wherein, enters code (6; 7) only can be only used once.
9. an application for the method according to any one of claim 1-8, for entering monitoring to buildings or construction zone or elevator (9).
10., for implementing an equipment for the method for entering monitoring according to any one of claim 1-8, comprise
Enter node (2), it is designed as follows and can be worked as follows: it can receive the identification code (ID) of the mobile phone (1) of visitor and can enter code (6 to the mobile phone of visitor (1) transmission; 7),
Control module (3), it is designed as follows and can be worked as follows: it can detect identification code (ID) and can produce and enter code (6; 7), described control module (3) can also set up files on each of customers for the visitor without access entitlements, described files on each of customers contains the rule that at least one should notify interviewee, control module (3) can send the message at the interviewee place arriving described visitor about visitor to communication unit, thus make interviewee know the arrival of visitor, and
Optical pickup (5), it is connected with control module (3).
11. equipment as claimed in claim 10, wherein, optical pickup (5) is scanner or camera.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP09157266A EP2237234A1 (en) | 2009-04-03 | 2009-04-03 | Method and device for access control |
EP09157266.9 | 2009-04-03 | ||
PCT/EP2010/054421 WO2010112586A1 (en) | 2009-04-03 | 2010-04-01 | Method and device for access control |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102449667A CN102449667A (en) | 2012-05-09 |
CN102449667B true CN102449667B (en) | 2016-02-17 |
Family
ID=40999821
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201080024088.0A Active CN102449667B (en) | 2009-04-03 | 2010-04-01 | For entering the method and apparatus of monitoring |
Country Status (9)
Country | Link |
---|---|
US (1) | US10068395B2 (en) |
EP (2) | EP2237234A1 (en) |
CN (1) | CN102449667B (en) |
AU (2) | AU2010230205B2 (en) |
CA (1) | CA2757405C (en) |
MY (1) | MY169822A (en) |
PL (1) | PL2415029T3 (en) |
SG (1) | SG175010A1 (en) |
WO (1) | WO2010112586A1 (en) |
Families Citing this family (74)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2237234A1 (en) | 2009-04-03 | 2010-10-06 | Inventio AG | Method and device for access control |
PL2697783T3 (en) * | 2011-03-29 | 2014-11-28 | Inventio Ag | Distribution of premises access information |
ITTV20110153A1 (en) * | 2011-11-08 | 2013-05-09 | Visionee S R L | VIDEO DOOR PHONE SYSTEM |
DE102012004259A1 (en) * | 2012-03-02 | 2013-09-05 | Abb Ag | Device for device configuration of at least one device of building system technology or door communication |
DE102012205379A1 (en) * | 2012-03-20 | 2013-09-26 | S. Siedle & Söhne Telefon- und Telegrafenwerke OHG | Method and system for carrying out a building access control |
DE102012006013A1 (en) * | 2012-03-24 | 2013-09-26 | Abb Ag | Access control of a door communication device or building system technology device |
DE102012006012A1 (en) | 2012-03-24 | 2013-09-26 | Abb Ag | Method for automatic triggering of switching action in electric door opener of house communication system or building technology system, involves performing triggering as soon as authentication provides authorization of beneficiary/user |
DE102012008657A1 (en) * | 2012-05-03 | 2013-11-07 | Torben Friehe | Method for transmitting data for actuating a device for opening a lock |
DE102012009128A1 (en) | 2012-05-05 | 2013-11-07 | Abb Ag | Method for communication between a mobile terminal and a device of building system technology or door communication |
EP2888855B1 (en) | 2012-08-21 | 2018-12-19 | Onity Inc. | Systems and methods for lock access management using wireless signals |
FR2997527B1 (en) * | 2012-10-31 | 2015-12-25 | Alpha Centauri | METHOD FOR CONTROLLING ACCESS TO A LOCAL BY READING A GRAPHIC CODE PRESENT ON A COUPON OF ACCESS, SYSTEM AND COMPUTER PROGRAM. |
WO2014116182A1 (en) * | 2013-01-25 | 2014-07-31 | Hitachi Elevator Asia Pte Ltd | System, device and method for controlling lift access and computer-readable medium storing computer-readable program for lift access |
DE102014106364A1 (en) | 2013-05-13 | 2014-11-13 | Hakan Orcan | System for checking access authorization for a locking device |
DE202013004667U1 (en) * | 2013-05-13 | 2013-07-31 | Hakan Orcan | The virtual key |
US9198041B2 (en) * | 2013-08-05 | 2015-11-24 | Nextek Power Systems, Inc. | Method of and system for authenticating a user to operate an electrical device |
TWI658717B (en) * | 2013-10-01 | 2019-05-01 | 瑞士商伊文修股份有限公司 | Access control method, access control system and computer-readable storage medium |
WO2015099990A1 (en) * | 2013-12-24 | 2015-07-02 | Hoeffner Daren | Method and system of controlling access to access points |
CN105197700A (en) * | 2014-06-05 | 2015-12-30 | 三菱电机上海机电电梯有限公司 | Visitor system taking two-dimensional code as medium for elevator and control method thereof |
DE102014008654A1 (en) * | 2014-06-13 | 2015-12-17 | Wago Verwaltungsgesellschaft Mbh | Temporary permission |
DE102015100127A1 (en) * | 2014-10-15 | 2016-04-21 | Klaus Multiparking Gmbh | Method and system for controlling a car parking device |
DE102014116183A1 (en) | 2014-11-06 | 2016-05-12 | Bundesdruckerei Gmbh | Method for providing an access code on a portable device and portable device |
SG11201703777TA (en) | 2014-12-02 | 2017-06-29 | Inventio Ag | Access control system with feedback to portable electronic device |
MX367662B (en) | 2014-12-02 | 2019-08-30 | Inventio Ag | Improved access control using portable electronic devices. |
CN104537736A (en) * | 2014-12-23 | 2015-04-22 | 韶关市英诺维科技设备有限公司 | Application of two-dimension code lock in business management |
RU2697827C2 (en) | 2015-01-27 | 2019-08-21 | Филипс Лайтинг Холдинг Б.В. | Proximity detection for device control |
CN104724558B (en) * | 2015-03-02 | 2016-04-20 | 上海电力学院 | A kind of initiatively reservation type intelligent elevator dispatching system |
US9972144B2 (en) | 2015-03-24 | 2018-05-15 | At&T Intellectual Property I, L.P. | Automatic physical access |
US9582841B2 (en) | 2015-03-24 | 2017-02-28 | At&T Intellectual Property I, L.P. | Location based emergency management plans |
US9824515B2 (en) | 2015-03-24 | 2017-11-21 | At&T Intellectual Property I, L.P. | Automatic calendric physical access |
US10296851B2 (en) | 2015-04-11 | 2019-05-21 | At&T Intellectual Property I, L.P. | Automatic allocation of physical facilities for maximum collaboration |
US20210049850A1 (en) * | 2016-02-29 | 2021-02-18 | Inventio Ag | Checking access authorizations using mobile control devices |
EP3440854B1 (en) | 2016-04-06 | 2020-09-16 | Otis Elevator Company | Mobile visitor management |
WO2017189820A1 (en) * | 2016-04-27 | 2017-11-02 | Cubic Corporation | 4d barcode |
DE102016108013B3 (en) * | 2016-04-29 | 2017-06-14 | Fujitsu Technology Solutions Intellectual Property Gmbh | Method for a system for safely opening a door and system for safely opening a door |
CN105844758B (en) * | 2016-05-20 | 2018-01-12 | 广州邻礼信息科技有限公司 | A kind of system and implementation method of property resident user and visitor's room entry/exit management |
CN106097531B (en) * | 2016-08-10 | 2019-08-13 | 深圳博科智能科技有限公司 | A kind of reserving method and mobile terminal and access control system applied to access control system |
CN106548224A (en) * | 2016-10-25 | 2017-03-29 | 中冶华天工程技术有限公司 | A kind of IC card management system and management method based on Quick Response Code |
JP6642380B2 (en) * | 2016-10-31 | 2020-02-05 | フジテック株式会社 | Elevator system |
EP3340095B1 (en) * | 2016-12-23 | 2020-07-08 | Löwenstein Medical Technology S.A. | Ventilation system and method |
MX2019008232A (en) * | 2017-01-09 | 2019-10-24 | Carrier Corp | Access control system with messaging. |
EP3610465A1 (en) | 2017-04-10 | 2020-02-19 | Inventio AG | Access control system having radio and facial recognition |
EP3610466B1 (en) | 2017-04-10 | 2024-05-01 | Inventio Ag | Visitor registration and access control method |
US20200290842A1 (en) | 2017-06-07 | 2020-09-17 | Inventio Ag | Elevator system with visitor operating mode |
US10397691B2 (en) * | 2017-06-20 | 2019-08-27 | Cubic Corporation | Audio assisted dynamic barcode system |
CN111051639B (en) | 2017-09-01 | 2022-05-17 | 亚萨合莱自动门系统有限公司 | Arrangement of an access system with one or more movable door members |
US20190084794A1 (en) * | 2017-09-20 | 2019-03-21 | Otis Elevator Company | Elevator request authorization system |
US10875741B2 (en) | 2017-09-29 | 2020-12-29 | Otis Elevator Company | Elevator request authorization system for a third party |
EP3729385B1 (en) * | 2017-12-20 | 2022-06-22 | Inventio AG | Access control system with wireless authentication and password entry |
WO2019121335A1 (en) | 2017-12-20 | 2019-06-27 | Inventio Ag | Access control system having radio and facial recognition |
US10865069B2 (en) | 2018-09-18 | 2020-12-15 | Otis Elevator Company | Effecting communication bridge with elevator system |
WO2020074360A1 (en) | 2018-10-12 | 2020-04-16 | Inventio Ag | System and method for position determination in a building |
AU2019358373B2 (en) | 2018-10-12 | 2022-10-06 | Inventio Ag | Access control system and method for operating an access control system |
CN111091644B (en) | 2018-10-24 | 2022-12-13 | 奥的斯电梯公司 | Authorization management of elevator service requests and authorization requests |
US20220074255A1 (en) | 2018-12-21 | 2022-03-10 | Inventio Ag | Access control system with sliding door with object monitoring function |
WO2020126644A1 (en) * | 2018-12-21 | 2020-06-25 | Inventio Ag | Access control system with sliding door with a gesture control function |
CN111615017A (en) * | 2019-02-26 | 2020-09-01 | 颜振 | System for achieving function of interphone by using two-dimensional bar code |
CN113518846B (en) | 2019-03-08 | 2022-10-25 | 因温特奥股份公司 | Access control system with moving door and visual status information |
SG11202109749QA (en) * | 2019-04-09 | 2021-10-28 | Kone Corp | Access right management |
EP3959483A1 (en) | 2019-04-26 | 2022-03-02 | Inventio AG | Access control system and method for operating an access control system |
IT201900011634A1 (en) * | 2019-07-12 | 2021-01-12 | Matichotels Srl | Access release system of a structure and associated method |
KR102281798B1 (en) * | 2019-10-07 | 2021-07-26 | 이기철 | Multiple Locks with Random Passwords |
AU2020403827A1 (en) | 2019-12-16 | 2022-06-30 | Inventio Ag | Human-machine interface device for building systems |
EP4078543A1 (en) | 2019-12-20 | 2022-10-26 | Inventio Ag | Building system for private user communication |
CN115427335A (en) * | 2020-04-29 | 2022-12-02 | 通力股份公司 | Scheme for generating non-contact elevator call |
EP4154224A1 (en) | 2020-05-18 | 2023-03-29 | Inventio Ag | Additional zone monitoring for a building door |
US20230272658A1 (en) | 2020-07-31 | 2023-08-31 | Inventio Ag | Building wall module with automatic doors for users and postal delivery |
AU2021323970A1 (en) * | 2020-08-13 | 2023-03-09 | Inventio Ag | Building system with elevator call entry via offline QR code credential |
JP7437521B2 (en) * | 2020-09-16 | 2024-02-22 | 株式会社日立製作所 | In-building traffic flow setting device and in-building traffic flow setting method |
CN112802233B (en) * | 2020-12-28 | 2021-11-12 | 徐永贵 | Generation and unlocking method, device, equipment and storage medium of laboratory electronic door lock |
CN112978526B (en) * | 2021-03-11 | 2023-04-28 | 郭强 | Access control method, equipment and system and elevator control method, equipment and system |
BE1029318B1 (en) * | 2021-04-16 | 2022-11-21 | Nine Eng | PROCEDURE FOR ACCESS CONTROL TO A PROTECTED ZONE |
ES2937716B2 (en) * | 2021-09-28 | 2023-07-31 | Laliga Content Prot Sl | Access control procedure and system |
WO2024002637A1 (en) | 2022-06-30 | 2024-01-04 | Inventio Ag | Access control system with barrier-free access |
US12002315B2 (en) * | 2022-10-12 | 2024-06-04 | Truist Bank | Virtual identification for granting secure access using varying forms of readable access codes |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2001041081A2 (en) * | 1999-12-03 | 2001-06-07 | First Hop Oy | A method and a system for obtaining services using a cellular telecommunication system |
WO2006000618A2 (en) * | 2004-06-28 | 2006-01-05 | Kone Corporation | Elevator arrangement |
FR2873217A1 (en) * | 2004-07-19 | 2006-01-20 | Francois Pierre Desgigot | Pocket electronic device e.g. mobile telephone, controlling method for e.g. building, involves displaying bar codes on screen of electronic device, and showing bar codes to bar code reader so as to be decrypted |
CN1838595A (en) * | 2005-03-25 | 2006-09-27 | 日本电气株式会社 | The authentication system and the authentication method which use a portable communication terminal |
Family Cites Families (30)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4655324A (en) * | 1985-09-23 | 1987-04-07 | Otis Elevator Company | Method for privately controlling an elevator |
JP2003515688A (en) * | 1999-11-30 | 2003-05-07 | ボーディング データ エーエス | Electronic key device, system, and method for managing electronic key information |
US6993123B1 (en) * | 2000-03-10 | 2006-01-31 | Verizon Services Corp. | Intelligent access control system |
US7133659B2 (en) * | 2000-09-29 | 2006-11-07 | Nokia Mobile Phones Limited | Methods of operating a reservation system using electronic device cover with embedded transponder |
TWI282941B (en) * | 2001-03-15 | 2007-06-21 | Toshiba Corp | Entrance management apparatus and entrance management method by using face features identification |
FI20010930A0 (en) * | 2001-05-04 | 2001-05-04 | Lauri Veikko Raeisaenen | A method and apparatus for indicating direction in a cellular network |
US6811078B2 (en) * | 2002-01-17 | 2004-11-02 | Monica L. Workens | Point-of-transaction machine with improved versatility and related method |
US7222241B2 (en) * | 2002-02-25 | 2007-05-22 | Info Data, Inc. | Building security and access protection system |
US7428413B2 (en) * | 2003-03-11 | 2008-09-23 | Wayport, Inc. | Method and system for providing network access and services using access codes |
US20060100779A1 (en) * | 2003-09-02 | 2006-05-11 | Vergin William E | Off-board navigational system |
US7387250B2 (en) * | 2003-12-04 | 2008-06-17 | Scanbuy, Inc. | System and method for on the spot purchasing by scanning barcodes from screens with a mobile device |
JP4541741B2 (en) | 2004-03-29 | 2010-09-08 | 東芝エレベータ株式会社 | Elevator system |
FI117010B (en) * | 2004-11-01 | 2006-05-15 | Kone Corp | Elevator remote control |
WO2006114613A1 (en) * | 2005-04-25 | 2006-11-02 | Mobiqa Limited | Mobile ticket authentication |
US20060293929A1 (en) * | 2005-06-23 | 2006-12-28 | Chunghwa Telecom Co., Ltd. | Electronic-ticket service system based on color-scale-code image recognition |
MY151605A (en) * | 2005-07-28 | 2014-06-30 | Inventio Ag | Method of controlling access to an area |
US7377426B1 (en) | 2005-09-01 | 2008-05-27 | Todd Makeever | Interactive visitor announcement/access control system |
KR101286392B1 (en) * | 2005-09-30 | 2013-07-15 | 인벤티오 아게 | Lift installation for transporting lift users inside a building |
PL1833219T3 (en) * | 2006-03-08 | 2015-01-30 | Monitise Ltd | Methods, apparatus and software for using a token to calculate time-limited password within cellular telephone |
WO2007132748A1 (en) * | 2006-05-12 | 2007-11-22 | Nec Corporation | Information processing system, information processing method, and device and program used for the information processing system and the information processing method |
US7920851B2 (en) * | 2006-05-25 | 2011-04-05 | Celltrust Corporation | Secure mobile information management system and method |
US8280359B2 (en) * | 2006-05-25 | 2012-10-02 | Celltrust Corporation | Methods of authorizing actions |
JP4996175B2 (en) * | 2006-08-29 | 2012-08-08 | 株式会社東芝 | Entrance management system and entrance management method |
US20100020970A1 (en) * | 2006-11-13 | 2010-01-28 | Xu Liu | System And Method For Camera Imaging Data Channel |
US8656472B2 (en) * | 2007-04-20 | 2014-02-18 | Microsoft Corporation | Request-specific authentication for accessing web service resources |
US8272038B2 (en) * | 2008-05-19 | 2012-09-18 | International Business Machines Corporation | Method and apparatus for secure authorization |
US8342407B2 (en) * | 2008-07-21 | 2013-01-01 | Gilbarco, Inc. | System and method for pairing a bluetooth device with a point-of-sale terminal |
EP2237234A1 (en) | 2009-04-03 | 2010-10-06 | Inventio AG | Method and device for access control |
WO2011150405A2 (en) * | 2010-05-28 | 2011-12-01 | Suridx, Inc. | Wireless encrypted control of physical access systems |
US20120298737A1 (en) * | 2011-05-26 | 2012-11-29 | Thales Avionics, Inc. | Methods, apparatuses and articles of manufacture to provide passenger preference data to in-flight entertainment systems |
-
2009
- 2009-04-03 EP EP09157266A patent/EP2237234A1/en not_active Withdrawn
-
2010
- 2010-04-01 MY MYPI2011004724A patent/MY169822A/en unknown
- 2010-04-01 EP EP10713326.6A patent/EP2415029B1/en active Active
- 2010-04-01 CN CN201080024088.0A patent/CN102449667B/en active Active
- 2010-04-01 AU AU2010230205A patent/AU2010230205B2/en active Active
- 2010-04-01 US US13/262,557 patent/US10068395B2/en active Active
- 2010-04-01 CA CA2757405A patent/CA2757405C/en active Active
- 2010-04-01 PL PL10713326T patent/PL2415029T3/en unknown
- 2010-04-01 SG SG2011071552A patent/SG175010A1/en unknown
- 2010-04-01 WO PCT/EP2010/054421 patent/WO2010112586A1/en active Application Filing
-
2016
- 2016-04-20 AU AU2016202519A patent/AU2016202519B2/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2001041081A2 (en) * | 1999-12-03 | 2001-06-07 | First Hop Oy | A method and a system for obtaining services using a cellular telecommunication system |
WO2006000618A2 (en) * | 2004-06-28 | 2006-01-05 | Kone Corporation | Elevator arrangement |
CN1976855A (en) * | 2004-06-28 | 2007-06-06 | 通力股份公司 | Elevator arrangement |
FR2873217A1 (en) * | 2004-07-19 | 2006-01-20 | Francois Pierre Desgigot | Pocket electronic device e.g. mobile telephone, controlling method for e.g. building, involves displaying bar codes on screen of electronic device, and showing bar codes to bar code reader so as to be decrypted |
CN1838595A (en) * | 2005-03-25 | 2006-09-27 | 日本电气株式会社 | The authentication system and the authentication method which use a portable communication terminal |
EP1705595A2 (en) * | 2005-03-25 | 2006-09-27 | NEC Corporation | The authentication system and the authentication method which use a portable communication terminal |
Also Published As
Publication number | Publication date |
---|---|
AU2016202519A1 (en) | 2016-05-12 |
EP2415029A1 (en) | 2012-02-08 |
AU2010230205A1 (en) | 2011-11-03 |
PL2415029T3 (en) | 2020-07-27 |
EP2237234A1 (en) | 2010-10-06 |
AU2010230205B2 (en) | 2016-05-12 |
WO2010112586A1 (en) | 2010-10-07 |
US10068395B2 (en) | 2018-09-04 |
SG175010A1 (en) | 2011-11-28 |
CA2757405A1 (en) | 2010-10-07 |
MY169822A (en) | 2019-05-16 |
CA2757405C (en) | 2018-05-29 |
US20120068818A1 (en) | 2012-03-22 |
CN102449667A (en) | 2012-05-09 |
EP2415029B1 (en) | 2020-02-12 |
AU2016202519B2 (en) | 2017-05-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102449667B (en) | For entering the method and apparatus of monitoring | |
US9286741B2 (en) | Apparatus and method for access control | |
US8922336B2 (en) | Entry/exit control system and method using shared codes combined with user personal information | |
US8881252B2 (en) | System and method for physical access control | |
CN105046775B (en) | Time domain Quick Response Code tripper | |
JP5164448B2 (en) | Legitimacy authentication system and legitimacy authentication method | |
CN109074693B (en) | Virtual panel for access control system | |
CN109360314A (en) | Reserve access method, system, computer equipment and storage medium | |
US9911260B2 (en) | Associating external credentials with mobile devices | |
AU2012234407A1 (en) | Distribution of premises access information | |
US11763615B2 (en) | Method for controlling package delivery | |
CN101930557B (en) | A kind of method and system of improving article delivery safety | |
WO2007029922A1 (en) | Multiple code service system and method thereof | |
US11736473B2 (en) | Identifiers and access tokens for privacy in centralized address management | |
JP2009086891A (en) | Content management device, its program, and content management method | |
JP2007048127A (en) | Attendance management system, portable communication device and program | |
US12020525B2 (en) | Property management systems | |
TW201537521A (en) | Automatic visitor system and host thereof | |
JP2008293137A (en) | Individual management apparatus and program | |
JP2008087957A (en) | Elevator facility safety management system | |
JP2007293508A (en) | Attendance management system, path code issuing device, attendance circumstance judging device and program | |
JP2006219857A (en) | Entry and withdrawal control method control system | |
US7905392B2 (en) | Code collection in mobile device | |
KR20200025320A (en) | Work management system and method using location information | |
CN106411898B (en) | A kind of electronics core label method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20231206 Address after: No. 555 Xingshun Road, Jiading District, Shanghai Patentee after: SCHINDLER (CHINA) ELEVATOR Co.,Ltd. Address before: Swiss Helge Sitwell Patentee before: Inventio AG |
|
TR01 | Transfer of patent right |